Analysis
-
max time kernel
152s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe
Resource
win10v2004-20220901-en
General
-
Target
37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe
-
Size
108KB
-
MD5
5468042f3bcf58d27edd9ee3d74dec2f
-
SHA1
1d90929f1ef79bc2d3ac107e9ce41bc3e8180d65
-
SHA256
37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36
-
SHA512
8fab527450b013a29737d099786e39f3c999e7354fc1213fab984c686fc32bab8f9d0a401341738ae4deb463c8da0d1910f1a6795d1a9af5dcabcaea8e1504dc
-
SSDEEP
1536:gk0KiB6oQ7Lh5+sXmNt0ttdPXLq0zTrk:l0moIeZtwXTzTo
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" juigiof.exe -
Executes dropped EXE 1 IoCs
pid Process 1144 juigiof.exe -
Loads dropped DLL 2 IoCs
pid Process 1284 37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe 1284 37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe -
Adds Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /h" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /z" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /e" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /c" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /j" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /p" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /f" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /k" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /l" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /r" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /i" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /a" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /x" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /s" juigiof.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /t" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /d" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /b" 37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /n" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /o" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /m" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /q" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /v" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /y" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /b" juigiof.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /g" juigiof.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\juigiof = "C:\\Users\\Admin\\juigiof.exe /w" juigiof.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1284 37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe 1144 juigiof.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1284 37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe 1144 juigiof.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1284 wrote to memory of 1144 1284 37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe 27 PID 1284 wrote to memory of 1144 1284 37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe 27 PID 1284 wrote to memory of 1144 1284 37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe 27 PID 1284 wrote to memory of 1144 1284 37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe"C:\Users\Admin\AppData\Local\Temp\37205f3aefc15acce8d9409e125882486238ef0bf3e77720f34cc36178ea6b36.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\juigiof.exe"C:\Users\Admin\juigiof.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1144
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5ed3a19173cd24139f7bd805a5ce9a1aa
SHA1e6cbc1ec5b63c3c0b87d30097fbc70b1c502eb35
SHA256ef41fb9b8e488e92fbb945538a792bf4f9d8f1a67fa6d3e280ff348367610c16
SHA512ec4a0660858fa35ca1b5940d4bd857c26d22c51e997435927d3b9c1a880a93e0444d40b0d332557a6aa214033ff894f6bdfcff9df359cdbea36cf3427a819076
-
Filesize
108KB
MD5ed3a19173cd24139f7bd805a5ce9a1aa
SHA1e6cbc1ec5b63c3c0b87d30097fbc70b1c502eb35
SHA256ef41fb9b8e488e92fbb945538a792bf4f9d8f1a67fa6d3e280ff348367610c16
SHA512ec4a0660858fa35ca1b5940d4bd857c26d22c51e997435927d3b9c1a880a93e0444d40b0d332557a6aa214033ff894f6bdfcff9df359cdbea36cf3427a819076
-
Filesize
108KB
MD5ed3a19173cd24139f7bd805a5ce9a1aa
SHA1e6cbc1ec5b63c3c0b87d30097fbc70b1c502eb35
SHA256ef41fb9b8e488e92fbb945538a792bf4f9d8f1a67fa6d3e280ff348367610c16
SHA512ec4a0660858fa35ca1b5940d4bd857c26d22c51e997435927d3b9c1a880a93e0444d40b0d332557a6aa214033ff894f6bdfcff9df359cdbea36cf3427a819076
-
Filesize
108KB
MD5ed3a19173cd24139f7bd805a5ce9a1aa
SHA1e6cbc1ec5b63c3c0b87d30097fbc70b1c502eb35
SHA256ef41fb9b8e488e92fbb945538a792bf4f9d8f1a67fa6d3e280ff348367610c16
SHA512ec4a0660858fa35ca1b5940d4bd857c26d22c51e997435927d3b9c1a880a93e0444d40b0d332557a6aa214033ff894f6bdfcff9df359cdbea36cf3427a819076